Analyzing web descriptions of cybersecurity breaches in the healthcare provider sector: A content analytics research method

被引:3
作者
Lee, In [1 ]
机构
[1] Western Illinois Univ, Coll Business & Technol, Sch Comp Sci, Macomb, IL 61455 USA
关键词
Data breach; Healthcare provider; Cybersecurity; Regression; Phishing; Ransomware; Vulnerabilities; Mitigation analytics; VULNERABILITIES; RISK;
D O I
10.1016/j.cose.2023.103185
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Though the ever-increasing data breach incidents in healthcare providers are exposing their clients' personal, financial, and medical data to cybercriminals, there is limited empirical research on the dynamics of data breaches. These dynamics include relationships between data breach types and locations, vulnerabilities, and mitigation efforts. To address the research gap, a four-step content analytics-based research method is developed. Firstly, the types of data breaches that take place at various data breach locations are analysed. Secondly, co-occurring keywords are identified from web descriptions of data breach incidents. Thirdly, multi-level themes related to keywords are derived. Lastly, themes and contextual information are translated into vulnerabilities, impacts, and mitigation efforts. The identified vulnerabilities, impacts, and mitigation efforts of the different breach type/location combinations aim to assist practitioners in the prevention and mitigation of cybersecurity breaches. (c) 2023 Elsevier Ltd. All rights reserved.
引用
收藏
页数:17
相关论文
共 76 条
  • [1] HIPAA Compliance and Training: A Perfect Storm for Professionalism Education?
    Agris, Julie L.
    Spandorfer, John M.
    [J]. JOURNAL OF LAW MEDICINE & ETHICS, 2016, 44 (04) : 652 - 656
  • [2] Information security governance challenges and critical success factors: Systematic review
    AlGhamdi, Sultan
    Khin Than Win
    Vlahu-Gjorgievska, Elena
    [J]. COMPUTERS & SECURITY, 2020, 99
  • [3] Analyzing the Implications of Healthcare Data Breaches through Computational Technique
    Almulihi, Ahmed H.
    Alassery, Fawaz
    Khan, Asif Irshad
    Shukla, Sarita
    Gupta, Bineet Kumar
    Kumar, Rajeev
    [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2022, 32 (03) : 1763 - 1779
  • [4] Angst CM, 2017, MIS QUART, V41, P893
  • [5] [Anonymous], 2017, Journal of Cyber Security Technology, DOI [10.1080/23742917.2016.1252211, DOI 10.1080/23742917.2016.1252211]
  • [6] Context-aware anonymous authentication protocols in the internet of things dedicated to e-health applications
    Arfaoui, Amel
    Kribeche, Ali
    Senouci, Sidi-Mohammed
    [J]. COMPUTER NETWORKS, 2019, 159 : 23 - 36
  • [7] Ayyagari R., 2012, Journal of Information Privacy Security, V8, P33, DOI [10.1080/15536548.2012.10845654, DOI 10.1080/15536548.2012.10845654]
  • [8] Comparing predictors in multivariate regression models: An extension of dominance analysis
    Azen, Razia
    Budescu, David V.
    [J]. JOURNAL OF EDUCATIONAL AND BEHAVIORAL STATISTICS, 2006, 31 (02) : 157 - 180
  • [9] Hospital Risk of Data Breaches
    Bai, Ge
    Jiang, John
    Flasher, Renee
    [J]. JAMA INTERNAL MEDICINE, 2017, 177 (06) : 878 - 880
  • [10] Costly but effective: Comparing the factors that influence employee anti-malware behaviours
    Blythe, John M.
    Coventry, Lynne
    [J]. COMPUTERS IN HUMAN BEHAVIOR, 2018, 87 : 87 - 97